US7415577B2 - Method and apparatus to write back data - Google Patents
Method and apparatus to write back data Download PDFInfo
- Publication number
- US7415577B2 US7415577B2 US10/799,555 US79955504A US7415577B2 US 7415577 B2 US7415577 B2 US 7415577B2 US 79955504 A US79955504 A US 79955504A US 7415577 B2 US7415577 B2 US 7415577B2
- Authority
- US
- United States
- Prior art keywords
- data
- bit
- cache
- memory
- level
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/02—Addressing or allocation; Relocation
- G06F12/08—Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
- G06F12/0802—Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches
- G06F12/0844—Multiple simultaneous or quasi-simultaneous cache accessing
- G06F12/0855—Overlapped cache accessing, e.g. pipeline
- G06F12/0857—Overlapped cache accessing, e.g. pipeline by multiple requestors
Definitions
- Two methods for writing information in a multilevel memory hierarchy may include “write through” and “write back.”
- Write through may refer to when information is written to both the cache memory and to a lower-level memory in the memory hierarchy.
- Write back may refer to when information is written only to the cache memory and may be written to the lower-level memory at a later point in time.
- Determining when to write back the information to the lower-level memory may involve many factors and tradeoffs in terms of system performance.
- FIG. 1 is a block diagram illustrating a computing system in accordance with an embodiment of the present invention
- FIG. 2 is a diagram illustrating a cache tag in accordance with an embodiment of the present invention
- FIG. 3 is a diagram illustrating cache lines in accordance with an embodiment of the present invention.
- FIG. 4 is a block diagram illustrating a wireless device in accordance with an embodiment of the present invention.
- the terms “include” and “comprise,” along with their derivatives, may be used, and are intended to be treated as synonyms for each other.
- the terms “coupled” and “connected,” along with their derivatives may be used. It should be understood that these terms are not intended as synonyms for each other. Rather, in particular embodiments, “connected” may be used to indicate that two or more elements are in direct physical or electrical contact with each other. “Coupled” may mean that two or more elements are in direct physical or electrical contact. However, “coupled” may also mean that two or more elements are not in direct contact with each other, but yet still co-operate or interact with each other.
- FIG. 1 is a block diagram illustrating a computing system 100 in accordance with an embodiment of the present invention.
- System 100 may include a processor 110 , a cache memory 120 coupled to processor 110 , and a memory 140 coupled to cache memory 120 .
- Cache memory 120 may also be simply referred to as a cache.
- system 100 may include other components such as, for example, more processors, input/output (I/O) devices, a storage device such as a disk memory coupled to memory 140 .
- I/O input/output
- storage device such as a disk memory coupled to memory 140 .
- these additional components have not been shown.
- Processor 110 may include logic to execute software instructions and may also be referred to as a core, a controller or a processing unit.
- Memories 120 and 140 may be volatile or nonvolatile memories capable of storing software instructions and/or data.
- the terms “data” or “information” may be used to refer to either data, instructions, or code.
- memory 120 may be a volatile memory such as, for example, a static random access memory (SRAM) and memory 140 may be a volatile memory such as, for example, a dynamic random access memory (DRAM).
- SRAM static random access memory
- DRAM dynamic random access memory
- cache memory 120 may have a relatively faster access time compared to memory 140 .
- the components of system 100 may be integrated together on a single silicon die, or in an alternate embodiment the components may be discrete components.
- processor 110 and cache memory 120 may be integrated together and memory 140 may be a discrete, external (“off-chip”) component.
- processor 110 may be said to include cache memory 120 .
- memory 140 may also be a cache memory.
- cache memory 120 may be for example a level 1 (L1) cache memory and may be referred to as an inner cache and memory 140 may be for example a level 2 (L2) cache memory and may be referred to as an outer cache.
- L1 level 1
- L2 level 2
- Memories 120 and 140 may collectively serve as the memory space, address space, or memory hierarchy of system 100 .
- memories 120 and 140 may form a multilevel memory hierarchy, wherein each memory is a level of memory in the memory hierarchy.
- the memory hierarchy of system 100 may be generally referred to as the memory of system 100 .
- the address space may be broken into fixed-size blocks. These blocks may be called pages and in one embodiment a block may be 4096 bytes, although the scope of the present invention is not limited in this respect.
- a “write back” scheme may be used to write information to the memory hierarchy of system 100 .
- a block of data e.g., 32 bytes
- this block of data may be written back to memory 140 at a later point in time after it is written to cache memory 120 .
- memory 140 may be referred to as a backing store or a lower level of memory in the memory hierarchy.
- Writing back of information from a one level of memory to another may also be referred to as an “evict” operation or a “cast out” operation.
- virtual addressing may be used to access, e.g., read or write, information from a particular location in the memory hierarchy.
- processor 110 may include a memory management unit (MMU) to provide virtual-to-physical address translation.
- processor 110 may include other components to employ virtual addressing such as, for example, a segment register or a base offset register.
- MMU memory management unit
- processor 110 may generate virtual addresses that are translated by a combination of hardware and software to physical addresses, that may be used to access the memory hierarchy. This process may be called address mapping, memory mapping or address translation. Virtual addresses may also be referred to as logical addresses.
- cache memory 120 may be referred to as a virtually addressed cache, although the scope of the present invention is not limited in this respect.
- Software processes executed by processor 110 may each use their own address mapping of virtual memory to physical memory to write and read information to and from the memory hierarchy. Examples of software processes may include, but are not limited to, word processing programs, spreadsheet programs, etc. Software processes may also be referred to as software applications or programs. Software processes may have multiple threads, wherein the threads of a process use the same address mapping.
- the address mapping when switching from one context to another, the address mapping may change. In other words, when switching from one software process to another, since each software process may have its own address mapping, the address mapping may change upon a switch from executing one software process to executing another software process.
- System 100 may detect a change in virtual address mapping. For example, to change the virtual address mapping, an operating system running in system 100 may set up a different page table or invalidate a translation lookaside buffer (TLB) entry. Depending on the system, the address mapping may be changed frequently, e.g., every 16 milliseconds (ms) in some systems.
- TLB translation lookaside buffer
- a buffer or a cache such as, e.g., cache memory 120
- information stored in a buffer or a cache may need to be written back to outer or lower levels of the memory hierarchy such as, e.g., memory 140 . This may occur frequently, for example, if the system uses virtual addressing. Then information stored in a cache or a buffer may need to be written back to another level of memory if the address mapping changes. For example, cache lines stored in cache memory 120 that are marked as “valid” and “dirty” may need to be written back to memory 140 if the virtual address mapping changes.
- a cache tag field may be associated with each cache line to provide information about the cache line. The cache tag field may also be referred to as status information or simply status, and may be stored in cache memory 120 .
- a line of cache data may be about 32 bytes of data stored in cache memory 120 , although the scope of the present invention is not limited in this respect.
- the cache tag field may contain one or more bits to indicate whether a predetermined amount of cache data, such as a line or block of data, is valid.
- the cache tag field may also contain one or more bits to indicate whether the predetermined amount of cache data is dirty.
- a cache line may be marked dirty if the cache line has been modified while in the cache. When the address mapping changes, a cache line stored in a virtually addressed cache or buffer that is marked as dirty and valid may need to be written back to another level of memory for coherency.
- the cache tag may also include one or more bits to indicate if a predetermined amount of cache data is pending or awaiting a write back.
- Cache tag 200 may include a valid bit 210 , a dirty bit 220 , and a write back (WB) bit 230 .
- Cache tag 200 may be associated with or correspond to a predetermined amount of cache data (not shown) stored in cache memory 120 ( FIG. 1 ).
- Cache tag 200 may be stored in a storage area of system 100 ( FIG. 1 ). For example, cache tag 200 may be stored in a portion of cache memory 120 .
- processor 110 may include a circuit or circuitry such as, for example, digital logic to set or assert WB bit 230 in response to a change in address mapping to indicate that a block of data is pending write back from a first level of the memory hierarchy (e.g., cache memory 120 ) to another level of the memory hierarchy (e.g., memory 140 ).
- WB bit 230 may also indicate that the block of data in the first level of the memory is not accessible with the current address mapping. In other words, after switching to executing another software process, the currently executing process may not be able to read or write information to the cache lines that have their corresponding write back bit(s) set.
- a first software process may be executed by processor 110 .
- the first software process may use a first virtual address mapping to write information to cache memory 120 .
- processor 110 may include logic to set the valid and dirty bits corresponding to the cache line.
- valid bit 210 and dirty bit 220 of cache tag 200 may be set.
- the virtual address mapping may be changed in response to switching from executing the first software process to executing a second software process, wherein the second software process uses a second virtual address mapping different than the first virtual address mapping used by the first software process.
- Processor 110 may include logic to detect the change in virtual address mapping and instead of writing back all the cache lines marked valid and dirty prior to execution of the second software process, processor 110 may set the write back bits of the valid and dirty cache lines stored in cache 120 to indicate that these lines are pending a write back at a later point in time.
- FIG. 3 a diagram 300 illustrating cache lines 301 , 302 and 303 is shown.
- Diagram 300 also shows the corresponding cache tag information and physical and virtual addresses for caches lines 301 - 303 .
- these cache lines may have their corresponding WB bit set to indicate that these cache lines are pending a write back.
- processor 110 may set WB bit 230 if valid bit 210 and dirty bit 220 are both set.
- Processor 110 may be adapted to write back the cache lines stored in cache 120 that have their corresponding WB bits set using either a “demand driven” write back scheme or a “lazy” write back scheme.
- a lazy write back scheme may be when access to the backing store is not otherwise needed, and processor 110 may detect when the backing store is not being accessed and then search through the cache tags and write back cache lines that have their corresponding WB bit set.
- An example of a demand driven write back scheme may be when no other free storage is available in cache memory 120 and system 100 may need to force write back of one or more of the cache lines that have their corresponding write back bit set.
- Another example of a demand driven write back scheme may be when power is about to be removed from system 100 , and system 100 may need to force write back of one or more of the cache lines that have their corresponding write back bit set.
- the software e.g., the operating system
- Execution of a subsequent software process may begin prior to writing back of all the cache lines that are marked valid and dirty in cache memory 120 . This may result in a more efficient write back scheme in terms of performance.
- processor 110 may include logic to prevent access to a cache line stored in cache memory 120 while the corresponding WB bit is set.
- processor 110 is adapted to prevent access to a cache line stored in cache memory 120 while the cache line is pending a write back to memory 140 .
- a cache tag may include multiple dirty bits, valid bits, and write back bits per cache line. For example, if a cache line was divided into two portions, then two dirty bits, two valid bits, and two write back bits per cache line may be used to indicate status of each half of the cache line. Further, although various embodiments above have discussed using a virtually addressed cache, the methods may also be used with other virtually addressed storage elements such as, for example, a virtually addressed buffer.
- a method and apparatus to write back data from one level of memory to another level of memory may include setting a status corresponding to a block of data in response to the change in address mapping to indicate that the block of data is pending write back from a first level of a memory hierarchy to a second level of the memory hierarchy and to indicate that the block of data in the first level of the memory is not accessible with the current address mapping.
- the status may be a bit in a cache tag field that may include information associated with the block of data. In other words, the status may be encoded in at least one bit in a cache tag.
- the apparatus may include a storage area to store the status associated with the block of data, wherein the status indicates that the block of data is pending write back and is not accessible with the current address mapping.
- an apparatus to write back a predetermined amount of data may include a storage area to store status information about a predetermined amount of data, wherein the status information is updated in response to a change in address mapping and the status information indicates if the predetermined amount of data is awaiting a write back from one level of a memory hierarchy to another level of the memory hierarchy.
- the apparatus may further include digital logic to prevent access to the predetermined amount of data by a currently executing software processes while the status information indicates that the predetermined amount of data is awaiting a write back.
- the apparatus may be processor 110 .
- the storage area may located in cache memory 120 , which may be located in processor 110 .
- the software may not have to wait for a complete cleaning of cache memory, i.e., writing back of dirty data, when changing address mapping. Rather, the software may continue with execution of subsequent processes and the hardware may automatically set the write back bits of the valid and dirty cache lines.
- the hardware may prevent subsequent processes from accessing cache lines having their corresponding write back bit set, and the hardware may then write back the cache lines having their write back bits set opportunistically, e.g., using either a lazy write back scheme or a demand driven write back scheme.
- Some systems may implement sharing of memory.
- address conflicts with future memory operations may be performed in a variety of ways including cache set identity or a directory at an outer level of cache.
- two software processes may share a single memory and each software process may be using different virtual addresses to access the same physical address in the memory.
- a directory, an aggressive cleaning process, or a self snoop process may be used.
- a self snoop may include in response to a cache miss, the system may obtain a physical address to look again to make sure it does not have a copy with a different virtual address.
- An aggressive cleaning or over-cleaning process may include forcing write backs frequently to ensure that no conflict occurs for any alias that may correspond to a particular physical address.
- the directory may be used by various components to determine what information is stored and where it is stored.
- wireless device 400 may use the methods discussed above and may include system 100 that is discussed above with reference to FIG. 1 .
- wireless device 400 may include an antenna 420 coupled to processor 110 via a wireless interface 430 .
- antenna 420 may be a dipole antenna, helical antenna or another antenna adapted to wirelessly communicate information.
- Wireless interface 430 may be adapted to process radio frequency (RF) and baseband signals using wireless protocols and may include a wireless transceiver.
- RF radio frequency
- Wireless device 400 may be a personal digital assistant (PDA), a laptop or portable computer with wireless capability, a web tablet, a wireless telephone (e.g., cordless or cellular phone), a pager, an instant messaging device, a digital music player, a digital camera, or other devices that may be adapted to transmit and/or receive information wirelessly.
- Wireless device 400 may be used in any of the following systems: a wireless personal area network (WPAN) system, a wireless local area network (WLAN) system, a wireless metropolitan area network (WMAN) system, or a wireless wide area network (WWAN) system such as, for example, a cellular system.
- WPAN wireless personal area network
- WLAN wireless local area network
- WMAN wireless metropolitan area network
- WWAN wireless wide area network
- An example of a WLAN system includes a system substantially based on an Industrial Electrical and Electronics Engineers (IEEE) 802.11 standard.
- An example of a WMAN system includes a system substantially based on an Industrial Electrical and Electronics Engineers (IEEE) 802.16 standard.
- An example of a WPAN system includes a system substantially based on the BluetoothTM standard (Bluetooth is a registered trademark of the Bluetooth Special Interest Group).
- Another example of a WPAN system includes a system substantially based on an Industrial Electrical and Electronics Engineers (IEEE) 802.15 standard such as, for example, the IEEE 802.15.3a specification using ultrawideband (UWB) technology.
- Examples of cellular systems include: Code Division Multiple Access (CDMA) cellular radiotelephone communication systems, Global System for Mobile Communications (GSM) cellular radiotelephone systems, Enhanced data for GSM Evolution (EDGE) systems, North American Digital Cellular (NADC) cellular radiotelephone systems, Time Division Multiple Access (TDMA) systems, Extended-TDMA (E-TDMA) cellular radiotelephone systems, GPRS, third generation (3G) systems like Wide-band CDMA (WCDMA), CDMA-2000, Universal Mobile Telecommunications System (UMTS), or the like.
- CDMA Code Division Multiple Access
- GSM Global System for Mobile Communications
- EDGE Enhanced data for GSM Evolution
- NADC North American Digital Cellular
- TDMA Time Division Multiple Access
- E-TDMA Extended-TDMA
- 3G third generation
- WCDMA Wide-band CDMA
- CDMA-2000 Code Division Multiple Access-2000
- UMTS Universal Mobile Telecommunications System
- computing system 100 is illustrated as being used in a wireless device in one embodiment, this is not a limitation of the present invention. In alternate embodiments system 100 may be used in non-wireless devices such as, for example, a server, a desktop, or an embedded device not adapted to wirelessly communicate information.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Memory System Of A Hierarchy Structure (AREA)
Abstract
Description
Claims (35)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/799,555 US7415577B2 (en) | 2004-03-10 | 2004-03-10 | Method and apparatus to write back data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/799,555 US7415577B2 (en) | 2004-03-10 | 2004-03-10 | Method and apparatus to write back data |
Publications (2)
Publication Number | Publication Date |
---|---|
US20050204099A1 US20050204099A1 (en) | 2005-09-15 |
US7415577B2 true US7415577B2 (en) | 2008-08-19 |
Family
ID=34920541
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/799,555 Active 2025-12-25 US7415577B2 (en) | 2004-03-10 | 2004-03-10 | Method and apparatus to write back data |
Country Status (1)
Country | Link |
---|---|
US (1) | US7415577B2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104050095A (en) * | 2013-03-14 | 2014-09-17 | 索尼公司 | Cache Control Device, Processor, Information Processing System, And Cache Control Method |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7752391B2 (en) * | 2006-01-20 | 2010-07-06 | Apple Inc. | Variable caching policy system and method |
US8250254B2 (en) * | 2007-07-31 | 2012-08-21 | Intel Corporation | Offloading input/output (I/O) virtualization operations to a processor |
TW201015319A (en) * | 2008-09-17 | 2010-04-16 | Panasonic Corp | Cache memory, memory system, data copying method and data rewriting method |
JP2011145838A (en) * | 2010-01-13 | 2011-07-28 | Toshiba Corp | Storage device management device and method for managing storage device |
US8868882B2 (en) * | 2011-06-08 | 2014-10-21 | Microsoft Corporation | Storage architecture for backup application |
US20190102324A1 (en) * | 2017-09-29 | 2019-04-04 | Intel Corporation | Cache behavior for secure memory repartitioning systems |
US12045474B2 (en) * | 2021-08-02 | 2024-07-23 | Red Hat, Inc. | Efficient dirty page expiration |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6134634A (en) * | 1996-12-20 | 2000-10-17 | Texas Instruments Incorporated | Method and apparatus for preemptive cache write-back |
US6564301B1 (en) * | 1999-07-06 | 2003-05-13 | Arm Limited | Management of caches in a data processing apparatus |
US7076613B2 (en) * | 2000-06-28 | 2006-07-11 | Intel Corporation | Cache line pre-load and pre-own based on cache coherence speculation |
-
2004
- 2004-03-10 US US10/799,555 patent/US7415577B2/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6134634A (en) * | 1996-12-20 | 2000-10-17 | Texas Instruments Incorporated | Method and apparatus for preemptive cache write-back |
US6564301B1 (en) * | 1999-07-06 | 2003-05-13 | Arm Limited | Management of caches in a data processing apparatus |
US7076613B2 (en) * | 2000-06-28 | 2006-07-11 | Intel Corporation | Cache line pre-load and pre-own based on cache coherence speculation |
Non-Patent Citations (1)
Title |
---|
John L. Hennessy, et al., "Computer Architecture", A Quantitative Approach, 3rd Addition 2003, pp. 390-402, 460-465, 549-554. |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104050095A (en) * | 2013-03-14 | 2014-09-17 | 索尼公司 | Cache Control Device, Processor, Information Processing System, And Cache Control Method |
US20140281271A1 (en) * | 2013-03-14 | 2014-09-18 | Sony Corporation | Cache control device, processor, information processing system, and cache control method |
Also Published As
Publication number | Publication date |
---|---|
US20050204099A1 (en) | 2005-09-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9384134B2 (en) | Persistent memory for processor main memory | |
JP3806131B2 (en) | Power control method and apparatus for address translation buffer | |
US8589650B2 (en) | Dynamically configurable memory system | |
EP1196850B1 (en) | Techniques for improving memory access in a virtual memory system | |
US9563575B2 (en) | Least recently used mechanism for cache line eviction from a cache memory | |
US9529730B2 (en) | Methods for cache line eviction | |
US20180088853A1 (en) | Multi-Level System Memory Having Near Memory Space Capable Of Behaving As Near Memory Cache or Fast Addressable System Memory Depending On System State | |
US7039763B2 (en) | Apparatus and method to share a cache memory | |
US20190324914A1 (en) | Method, Apparatus, and Non-Transitory Readable Medium for Accessing Non-Volatile Memory | |
WO2004102376A2 (en) | Apparatus and method to provide multithreaded computer processing | |
US7415577B2 (en) | Method and apparatus to write back data | |
US9424198B2 (en) | Method, system and apparatus including logic to manage multiple memories as a unified exclusive memory | |
US20030079103A1 (en) | Apparatus and method to perform address translation | |
JP3895760B2 (en) | Power control method and apparatus for address translation buffer | |
US7240168B2 (en) | Method and system to order memory operations | |
US20050213399A1 (en) | Method and apparatus to write data | |
US6976117B2 (en) | Snoopy virtual level 1 cache tag | |
US9251096B2 (en) | Data compression in processor caches | |
US20050223153A1 (en) | Physically-tagged cache with virtual fill buffers | |
US8117393B2 (en) | Selectively performing lookups for cache lines | |
US20040024970A1 (en) | Methods and apparatuses for managing memory | |
Park et al. | Analysis of memory access latency considering page faults and TLB misses in NVM storage | |
WO2000045270A1 (en) | Techniques for improving memory access in a virtual memory system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: INTEL CORPORATION, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MORROW, MICHAEL W.;REEL/FRAME:015079/0919 Effective date: 20040308 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
CC | Certificate of correction | ||
FPAY | Fee payment |
Year of fee payment: 4 |
|
AS | Assignment |
Owner name: MICRON TECHNOLOGY, INC., IDAHO Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NUMONYX B.V.;REEL/FRAME:027075/0682 Effective date: 20110930 |
|
AS | Assignment |
Owner name: NUMONYX B.V., SWITZERLAND Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTEL CORPORATION;REEL/FRAME:028055/0625 Effective date: 20080325 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
AS | Assignment |
Owner name: U.S. BANK NATIONAL ASSOCIATION, AS COLLATERAL AGENT, CALIFORNIA Free format text: SECURITY INTEREST;ASSIGNOR:MICRON TECHNOLOGY, INC.;REEL/FRAME:038669/0001 Effective date: 20160426 Owner name: U.S. BANK NATIONAL ASSOCIATION, AS COLLATERAL AGEN Free format text: SECURITY INTEREST;ASSIGNOR:MICRON TECHNOLOGY, INC.;REEL/FRAME:038669/0001 Effective date: 20160426 |
|
AS | Assignment |
Owner name: MORGAN STANLEY SENIOR FUNDING, INC., AS COLLATERAL AGENT, MARYLAND Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:MICRON TECHNOLOGY, INC.;REEL/FRAME:038954/0001 Effective date: 20160426 Owner name: MORGAN STANLEY SENIOR FUNDING, INC., AS COLLATERAL Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:MICRON TECHNOLOGY, INC.;REEL/FRAME:038954/0001 Effective date: 20160426 |
|
AS | Assignment |
Owner name: U.S. BANK NATIONAL ASSOCIATION, AS COLLATERAL AGENT, CALIFORNIA Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE REPLACE ERRONEOUSLY FILED PATENT #7358718 WITH THE CORRECT PATENT #7358178 PREVIOUSLY RECORDED ON REEL 038669 FRAME 0001. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY INTEREST;ASSIGNOR:MICRON TECHNOLOGY, INC.;REEL/FRAME:043079/0001 Effective date: 20160426 Owner name: U.S. BANK NATIONAL ASSOCIATION, AS COLLATERAL AGEN Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE REPLACE ERRONEOUSLY FILED PATENT #7358718 WITH THE CORRECT PATENT #7358178 PREVIOUSLY RECORDED ON REEL 038669 FRAME 0001. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY INTEREST;ASSIGNOR:MICRON TECHNOLOGY, INC.;REEL/FRAME:043079/0001 Effective date: 20160426 |
|
AS | Assignment |
Owner name: JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT, ILLINOIS Free format text: SECURITY INTEREST;ASSIGNORS:MICRON TECHNOLOGY, INC.;MICRON SEMICONDUCTOR PRODUCTS, INC.;REEL/FRAME:047540/0001 Effective date: 20180703 Owner name: JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT, IL Free format text: SECURITY INTEREST;ASSIGNORS:MICRON TECHNOLOGY, INC.;MICRON SEMICONDUCTOR PRODUCTS, INC.;REEL/FRAME:047540/0001 Effective date: 20180703 |
|
AS | Assignment |
Owner name: MICRON TECHNOLOGY, INC., IDAHO Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:U.S. BANK NATIONAL ASSOCIATION, AS COLLATERAL AGENT;REEL/FRAME:047243/0001 Effective date: 20180629 |
|
AS | Assignment |
Owner name: MICRON TECHNOLOGY, INC., IDAHO Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:MORGAN STANLEY SENIOR FUNDING, INC., AS COLLATERAL AGENT;REEL/FRAME:050937/0001 Effective date: 20190731 |
|
AS | Assignment |
Owner name: MICRON TECHNOLOGY, INC., IDAHO Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT;REEL/FRAME:051028/0001 Effective date: 20190731 Owner name: MICRON SEMICONDUCTOR PRODUCTS, INC., IDAHO Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT;REEL/FRAME:051028/0001 Effective date: 20190731 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 12 |